US20100138670A1 - Storage apparatus and data writing method - Google Patents
Storage apparatus and data writing method Download PDFInfo
- Publication number
- US20100138670A1 US20100138670A1 US12/568,330 US56833009A US2010138670A1 US 20100138670 A1 US20100138670 A1 US 20100138670A1 US 56833009 A US56833009 A US 56833009A US 2010138670 A1 US2010138670 A1 US 2010138670A1
- Authority
- US
- United States
- Prior art keywords
- user data
- key
- pieces
- region
- changing region
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00282—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored in the content area, e.g. program area, data area or user area
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
- G11B20/00507—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein consecutive physical data units of the record carrier are encrypted with separate encryption keys, e.g. the key changes on a cluster or sector basis
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10527—Audio or video recording; Data buffering arrangements
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10527—Audio or video recording; Data buffering arrangements
- G11B2020/1062—Data buffering arrangements, e.g. recording or playback buffers
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10527—Audio or video recording; Data buffering arrangements
- G11B2020/1062—Data buffering arrangements, e.g. recording or playback buffers
- G11B2020/1075—Data buffering arrangements, e.g. recording or playback buffers the usage of the buffer being restricted to a specific kind of data
- G11B2020/10759—Data buffering arrangements, e.g. recording or playback buffers the usage of the buffer being restricted to a specific kind of data content data
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B2220/00—Record carriers by type
- G11B2220/20—Disc-shaped record carriers
- G11B2220/25—Disc-shaped record carriers characterised in that the disc is based on a specific recording technology
- G11B2220/2508—Magnetic discs
- G11B2220/2516—Hard disks
Definitions
- One embodiment of the invention relates to a storage apparatus and a data writing method, and particularly to a storage apparatus and a data writing method that encrypt, when a key for encrypting user data in a storage medium is changed, the user data with a new key and safely write the encrypted data into the storage medium.
- Examples of such storage apparatuses having security functions are a magnetic storage apparatus that reads out, when a key used to encrypt the user data (decryption or encryption) is changed, a part of the user data stored in a sector on a storage medium, encrypts the read user data with the changed key, and write the encrypted user data into the same sector, or a magnetic storage apparatus that retreats the encrypted user data into a temporal retreat region, and writes the retreated user data into the same sector.
- FIG. 1 is an exemplary block diagram of a storage apparatus according to one embodiment of the invention.
- FIG. 2 is an exemplary explanatory diagram of an encryption-key-changing region in the embodiment
- FIG. 3 is an exemplary explanatory diagram of an encryption key changing process according to a first embodiment of the invention
- FIG. 4 is an exemplary explanatory diagram of the encryption key changing process in the first embodiment
- FIG. 5 is an exemplary flowchart of the encryption key changing process in the first embodiment
- FIG. 6 is an exemplary explanatory diagram of an encryption key changing process according to a second embodiment of the invention.
- FIG. 7 is an exemplary flowchart of the encryption key changing process in the second embodiment
- FIG. 8 is an exemplary explanatory diagram of an encryption key changing process according to a third embodiment of the invention.
- FIG. 9 is an exemplary flowchart of the encryption key changing process in the third embodiment.
- a storage apparatus includes: a controller configured to encrypt user data with a key, and write the encrypted user data in a storage medium; and a key changing module configured to change the key.
- the storage medium includes a user data region storing the encrypted user data and a key changing region of a logical block with a predetermined size, the key changing region being adjacent to the user data region.
- the controller is configured to divide the user data written in the storage medium into a plurality of pieces of the user data each corresponding to a logical block size of the logical block, encrypt a piece of the user data adjacent to the key changing region with the changed key, write the encrypted piece into the key changing region, sequentially shift each of the pieces of the user data other than the piece of the user data adjacent to the key changing region by one logical block size in a direction toward the key changing region from positions in the storage region in which the pieces of the divided user data other than the piece of the divided user data adjacent to the key changing region are written, and write the shifted pieces.
- a data writing method applied to a storage apparatus including a controller and a key changing module, the controller being configured to encrypt user data with a key, and write the encrypted user data in a storage medium, the key changing module being configured to change the key, the storage medium including a user data region storing the encrypted user data and a key changing region of a logical block with a predetermined size, the key changing region being adjacent to the user data region, the data writing method includes: when the key is changed, the controller of the storage apparatus dividing the user data written in the storage medium into a plurality of pieces of the user data each corresponding to a logical block size of the logical block, encrypting a piece of the user data adjacent to the key changing region with the changed key, writing the encrypted piece into the key changing region, sequentially shifting each of the pieces of the user data other than the piece of the user data adjacent to the key changing region by one logical block size in a direction toward the key changing region from positions in the storage region in which the pieces of the divided user
- FIG. 1 is a block diagram of a storage apparatus according to one embodiment.
- the storage apparatus according to the embodiment is a magnetic storage apparatus 1 such as a hard disk drive (HDD).
- the magnetic storage apparatus 1 includes a micro processing unit (MPU) 11 , a host interface (I/F) controller 12 , a buffer memory 13 , an encryption circuit controller 14 , an encryption circuit 15 , a read channel 16 , a head integrated circuit (IC) 17 , a head 18 , a servo controller 19 , a voice coil motor (VCM) 20 , and a spindle motor (SPM) 21 .
- MPU micro processing unit
- I/F interface
- IC head integrated circuit
- VCM voice coil motor
- SPM spindle motor
- the MPU 11 controls the entire magnetic storage apparatus 1 .
- the host I/F controller 12 is an interface between a host computer (host) 2 and the magnetic storage apparatus 1 , and receives a request (a read request, a write request, or a key change request) from the host 2 to inform the MPU 11 of the request.
- the host I/F controller 12 also returns a response for the request to the host 2 according to an instruction of the MPU 11 .
- the host 2 requests key change by sending a key change command for changing a key used to encrypt the user data, to the magnetic storage apparatus 1 via the host I/F controller 12 .
- the buffer memory 13 stores therein user data read out from a storage medium 22 and user data to which a write request from the host 2 is subjected.
- the encryption circuit controller 14 controls the encryption circuit 15 according to an instruction of the MPU 11 to change a key to be used by the encryption circuit 15 . More specifically, once the MPU 11 receives a key change request from the host 2 , the MPU 11 instructs the encryption circuit controller 14 to change the key to be used by the encryption circuit 15 for encrypting the user data.
- the encryption circuit 15 uses the key to encrypt the user data (encryption or decryption) stored in the buffer memory 13 .
- the read channel 16 reads out the user data in the storage medium 22 through the head IC 17 and the head 18 according to an instruction of the MPU 11 .
- the read channel 16 also writes user data encrypted by the encryption circuit 15 into the storage medium 22 through the head IC 17 and the head 18 according to an instruction of the MPU 11 .
- the head IC 17 as is well known, reads out user data from the storage medium 22 , and writes the user data into the storage medium 22 through the head 18 .
- the servo controller 19 controls and enables the VCM 20 to perform positioning control of the head 18 according to an instruction of the MPU 11 .
- the servo controller 19 also controls the SPM 21 .
- the VCM 20 performs the positioning control of the head 18 according to an instruction of the servo controller 19 .
- the SPM 21 rotationally drives the storage medium 22 according to an instruction of the servo controller 19 .
- User data is written into the storage medium 22 .
- FIG. 2 is a diagram illustrating an encryption-key-changing region.
- the storage region of the storage medium includes a user data region storing the user data and an encryption-key-changing region, which is a region used for changing the key. Divided user data is written into the encryption-key-changing region when performing a key changing process.
- the encryption-key-changing region is provided adjacent to the user data region.
- Physical LBA illustrated in FIG. 2 is a logical block address (LBA) managed by the magnetic storage apparatus, and a designated LBA is an LBA designated by the host (the same can be said for FIGS. 3 , 4 , and 6 ).
- FIGS. 3 and 4 are diagrams for explaining an encryption key changing process of a first embodiment. It is assumed herein that the user data is encrypted with a key EK 1 before changing the encryption key.
- the MPU 11 instructs the encryption circuit controller 14 to change the key to be used by the encryption circuit 15 for encrypting the user data, from EK 1 to EK 2 .
- the MPU 11 divides the user data corresponding to the key to be changed into a plurality (five in FIG. 3 ) of pieces of user data each with a predetermined logical block size corresponding to the encryption-key-changing region, reads out the pieces of the user data, and sequentially stores the pieces of the user data in the buffer memory 13 .
- the MPU 11 controls the encryption circuit 15 to encrypt a piece of the user data (data 1 ) adjacent to the encryption-key-changing region among the divided user data in the buffer memory 13 with the key EK 2 , and writes the encrypted piece into the encryption-key-changing region (see # 1 in FIG. 3 ).
- the MPU 11 then sequentially shifts each piece of the user data (data 2 to 5 ) other than the data 1 in a direction toward the encryption-key-changing region (see # 2 to # 5 in FIG. 3 ), and writes the shifted data.
- the MPU 11 sets the storage region in which the shifted piece was written as a new encryption-key-changing region, for example, every time the piece is shifted.
- the MPU 11 uses the shading portion adjacent to the user data in FIG. 4 as a new encryption-key-changing region to perform the key changing process same as the key changing process explained with reference to FIG. 3 .
- FIG. 5 is an exemplary flowchart of the encryption key changing process of the first embodiment.
- the MPU 11 determines whether all pieces of the divided user data have been shifted (S 1 ). If the MPU 11 determines that the all pieces have been shifted, the process is terminated. If the MPU 11 determines that a piece of the divided user data remains not shifted, the MPU 11 controls the encryption circuit controller 14 to set the current encryption key (EK 1 ) to the encryption circuit 15 (S 2 ). The encryption circuit 15 decrypts the piece of the divided user data to be shifted with the set key EK 1 . The MPU 11 then stores the piece of the divided user data adjacent to the encryption-key-changing region in the buffer memory 13 (S 3 ).
- the MPU 11 controls the encryption circuit controller 14 to set a new encryption key (EK 2 ) to the encryption circuit 15 (S 4 ).
- the encryption circuit 15 uses the set key EK 2 to encrypt the piece of the divided user data to be shifted and being stored in the buffer memory 13 .
- the MPU 11 then writes the encrypted piece of the divided user data into the encryption-key-changing region (S 5 ).
- S 5 the divided user data is shifted into the encryption-key-changing region.
- the MPU 11 sets the storage region where the shifted piece of divided user data was written as a new encryption-key-changing region (S 6 ), and the process returns to S 1 .
- the original data is stored still in the region where the shifted data was stored, thereby preventing data loss.
- FIG. 6 is a diagram for explaining an encryption key changing process of a second embodiment.
- the user data region of the storage medium 22 is divided into a first range and a second range, corresponding to a plurality of ranges each using different key for encrypting the user data.
- a key corresponding to the first range is EK 1 a
- a key corresponding to the second range is EK 1 b .
- the encryption-key-changing region of a logical block with a predetermined size is provided so as to be adjacent to and so as to correspond to each range.
- a first encryption-key-changing region corresponding to the first range and a second encryption-key-changing region corresponding to the second range are provided.
- the MPU 11 performs the encryption key changing process in a similar manner as to that of the first embodiment explained with reference to FIGS. 3 and 4 on the user data of the first range. That is, the MPU 11 divides the user data of the first range corresponding to the key to be changed as the divided user data, encrypts a piece of the divided user data adjacent to the first encryption-key-changing region with a new key, and then writes the encrypted piece of the divided user data into the first encryption-key-changing region.
- the MPU 11 sequentially shifts each piece of the divided user data in the first range other than the one that has been written into the first encryption-key-changing region in a direction toward the first encryption-key-changing region, and writes the each piece of the divided user data in the first range other than the one that has been written into the first region. If a key change command received by the MPU 11 from the host 2 relates to the user data region of the second range, the MPU 11 performs the encryption key changing process on the user data in the second range in a similar manner to the process described above.
- FIG. 7 is a flowchart of the encryption key changing process of the second embodiment.
- an encryption key changing process where a key change command received by the MPU 11 from the host 2 relates to the user data region of the first range will be explained.
- the MPU 11 determines whether all pieces of the divided user data of the first range have been shifted (S 11 ). If the MPU 11 determines all pieces of the divided user data of the first range have been shifted, the process is terminated. If the MPU 11 determines a piece of the divided user data of the first range remains not shifted, the MPU 11 controls the encryption circuit controller 14 to set the current encryption key (EK 1 a ) to the encryption circuit 15 (S 12 ). The MPU 11 then stores the piece of the divided user data of the first range adjacent to the first encryption-key-changing region in the buffer memory 13 (S 13 ). The MPU 11 controls the encryption circuit controller 14 to set a new encryption key (EK 2 a ) to the encryption circuit 15 (S 14 ).
- the piece of the divided user data stored in the buffer memory 13 is encrypted with the key EK 2 a .
- the MPU 11 writes the encrypted piece of the divided user data into the first encryption-key-changing region (S 15 ).
- the divided user data is shifted into the encryption-key-changing region.
- the MPU 11 sets the storage region in which the shifted divided user data was written as a new first encryption-key-changing region (S 16 ), and the process returns to S 11 .
- the second embodiment it is possible to sequentially write pieces of the divided user data to be shifted into a region for changing a key corresponding to the range of the divided user data.
- FIG. 8 is an explanatory diagram of an encryption key changing process of a third embodiment.
- the user data region of the storage medium 22 is divided into the first range with the corresponding key EK 1 a and the second range with the corresponding key EK 1 b .
- an encryption-key-changing region with a logical block of a predetermined size is provided adjacent to any one of the ranges.
- not only the user data with a corresponding key is changed but also the user data with an unchanged key is to be shifted in a direction toward the encryption-key-changing region.
- the encryption-key-changing region is provided adjacent to the second range.
- the MPU 11 divides the user data of the second range into a plurality of pieces of second divided user data and the user data of the first range into a plurality of pieces of first divided user data.
- the MPU 11 sequentially stores the pieces of the second divided user data in the buffer memory 13 without decryption.
- the MPU 11 may sequentially store the pieces of the second divided user data in the buffer memory 13 after decryption with any key (for example, with the key EK 1 b used to encrypt the second divided user data).
- the MPU 11 decrypts the pieces of the first divided user data with the key EK 1 a used to encrypt thereof, and sequentially stores the pieces of the first divided user data in the buffer memory 13 .
- the MPU 11 sequentially shifts each piece of the second divided user data in a direction toward the encryption-key-changing region (see # 1 in FIG. 8 ), and writes the each shifted piece.
- the MPU 11 sets the storage region in which the shifted second divided user data was written as a new encryption-key-changing region, for example, every time the second divided user data is shifted (the same applies to the shifting of the first divided user data described later). That is, in the third embodiment, the pieces of the divided user data adjacent to the sequentially set encryption-key-changing region are to be shifted.
- the MPU 11 encrypts the first divided user data stored in the buffer memory 13 with the new key EK 2 a .
- the MPU 11 then sequentially shifts the encrypted pieces of the first divided user data in a direction toward the encryption-key-changing region (see # 2 in FIG. 8 ), and writes the shifted pieces.
- FIG. 9 is a flowchart of the encryption key changing process of the third embodiment.
- the MPU 11 determines whether all pieces of the divided user data have been shifted (S 21 ). If the MPU 11 determines all pieces of the divided user data have been shifted, the process is terminated. If the MPU 11 determines a piece of the divided user data remains not shifted, the MPU 11 determines whether the piece of the divided user data to be shifted is the divided user data in the range corresponding to the key to be changed (key changed data) (S 22 ). If the MPU 11 determines the piece of the divided user data to be shifted is not the key changed data, the MPU 11 controls the encryption circuit controller 14 to perform a encryption invalid setting on the encryption circuit 15 (S 23 ). The encryption invalid setting is a setting not to perform the encryption processing on the divided user data.
- the MPU 11 stores the piece of the divided user data adjacent to the encryption-key-changing region in the buffer memory 13 (S 24 ).
- the MPU 11 controls the encryption circuit controller 14 to perform the encryption invalid setting on the encryption circuit 15 (S 25 ).
- the MPU 11 then writes the divided user data stored in the buffer memory 13 into the encryption-key-changing region (S 26 ).
- S 26 the divided user data is shifted into the encryption-key-changing region.
- the MPU 11 sets the storage region in which the shifted divided user data was written as a new encryption-key-changing region (S 27 ), and the process returns to S 21 .
- the MPU 11 determines the piece of the divided user data to be shifted is the key changed data
- the MPU 11 controls the encryption circuit controller 14 to set the current key (the key originally used for the encryption processing of the key changed data) to the encryption circuit 15 (S 28 ).
- the encryption circuit 15 uses the set current key to decrypt the piece of the divided user data to be shifted and being stored in the buffer memory 13 .
- the MPU 11 then stores the piece of the divided user data to be shifted, that is, a piece of the divided user data adjacent to the encryption-key-changing region, in the buffer memory 13 (S 29 ).
- the MPU 11 controls the encryption circuit controller 14 to set a new key to the encryption circuit 15 (S 30 ).
- the encryption circuit 15 uses the set new key to encrypt the piece of the divided user data to be shifted and stored in the buffer memory 13 .
- the MPU 11 writes the divided user data that is encrypted with the new key into the encryption-key-changing region (S 31 ).
- the divided user data is shifted into the encryption-key-changing region.
- the MPU 11 sets the storage region in which the shifted divided user data was written as a new encryption-key-changing region (S 32 ), and the process returns to S 21 .
- the MPU 11 may set any key to decrypt a piece of the divided user data to be shifted with the set key. Moreover, instead of S 25 , the MPU 11 may set any key as mentioned above to encrypt a piece of the divided user data to be shifted with the set key.
- the third embodiment it is possible to encrypt the divided user data in a range corresponding to a new key with the new key, sequentially shift pieces of the divided user data in a direction toward the encryption-key-changing region, and write the shifted pieces. Further, according to the third embodiment, it is possible to sequentially shift pieces of the divided user data in a range other than the range corresponding to the new key in a direction toward the encryption-key-changing region, and write the shifted pieces, without the encryption processing.
- the user data written in the storage medium is divided into a plurality of pieces of user data.
- a piece of the divided user data adjacent to the key-changing region, which is provided on the storage medium, is encrypted with the new key and written into the key-changing region.
- pieces of the divided user data other than the one adjacent to the key-changing region are sequentially shifted in a direction from positions in the storage region where the pieces of the divided user data are written toward the key-changing region, and written.
- the various modules of the systems described herein can be implemented as software applications, hardware and/or software modules, or components on one or more computers, such as servers. While the various modules are illustrated separately, they may share some or all of the same underlying logic or code.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Storage Device Security (AREA)
Abstract
Description
- This application is based upon and claims the benefit of priority from Japanese Patent Application No. 2008-303316, filed Nov. 28, 2008, the entire contents of which are incorporated herein by reference.
- 1. Field
- One embodiment of the invention relates to a storage apparatus and a data writing method, and particularly to a storage apparatus and a data writing method that encrypt, when a key for encrypting user data in a storage medium is changed, the user data with a new key and safely write the encrypted data into the storage medium.
- 2. Description of the Related Art
- In recent years, from the point of view of protecting confidential information and avoiding information leakage, demands for magnetic storage apparatuses and optical storage apparatuses having security functions are increasing. Examples of such storage apparatuses having security functions are a magnetic storage apparatus that reads out, when a key used to encrypt the user data (decryption or encryption) is changed, a part of the user data stored in a sector on a storage medium, encrypts the read user data with the changed key, and write the encrypted user data into the same sector, or a magnetic storage apparatus that retreats the encrypted user data into a temporal retreat region, and writes the retreated user data into the same sector.
- There is also proposed a data processing apparatus that encrypts data to be written into a storage medium with random numbers generated by an M-series random number generation module serving as a encryption key (see Japanese Patent Application Publication (KOKAI) No. 2006-259988).
- Conventional magnetic storage apparatuses that read out user data, encrypt the read user data with a new key, and write back the encrypted user data into the same sector, when a key is changed, may lose the user data when the power is turned off while writing the encrypted user data into the same sector. Further, a conventional magnetic storage apparatuses that write the encrypted user data into the same sector after the encrypted user data is retreated to a temporal retreat region requires much time for writing the user data when a key is changed.
- A general architecture that implements the various features of the invention will now be described with reference to the drawings. The drawings and the associated descriptions are provided to illustrate embodiments of the invention and not to limit the scope of the invention.
-
FIG. 1 is an exemplary block diagram of a storage apparatus according to one embodiment of the invention; -
FIG. 2 is an exemplary explanatory diagram of an encryption-key-changing region in the embodiment; -
FIG. 3 is an exemplary explanatory diagram of an encryption key changing process according to a first embodiment of the invention; -
FIG. 4 is an exemplary explanatory diagram of the encryption key changing process in the first embodiment; -
FIG. 5 is an exemplary flowchart of the encryption key changing process in the first embodiment; -
FIG. 6 is an exemplary explanatory diagram of an encryption key changing process according to a second embodiment of the invention; -
FIG. 7 is an exemplary flowchart of the encryption key changing process in the second embodiment; -
FIG. 8 is an exemplary explanatory diagram of an encryption key changing process according to a third embodiment of the invention; and -
FIG. 9 is an exemplary flowchart of the encryption key changing process in the third embodiment. - Various embodiments according to the invention will be described hereinafter with reference to the accompanying drawings. In general, according to one embodiment of the invention, a storage apparatus includes: a controller configured to encrypt user data with a key, and write the encrypted user data in a storage medium; and a key changing module configured to change the key. The storage medium includes a user data region storing the encrypted user data and a key changing region of a logical block with a predetermined size, the key changing region being adjacent to the user data region. When the key is changed, the controller is configured to divide the user data written in the storage medium into a plurality of pieces of the user data each corresponding to a logical block size of the logical block, encrypt a piece of the user data adjacent to the key changing region with the changed key, write the encrypted piece into the key changing region, sequentially shift each of the pieces of the user data other than the piece of the user data adjacent to the key changing region by one logical block size in a direction toward the key changing region from positions in the storage region in which the pieces of the divided user data other than the piece of the divided user data adjacent to the key changing region are written, and write the shifted pieces.
- According to another embodiment of the invention, a data writing method applied to a storage apparatus including a controller and a key changing module, the controller being configured to encrypt user data with a key, and write the encrypted user data in a storage medium, the key changing module being configured to change the key, the storage medium including a user data region storing the encrypted user data and a key changing region of a logical block with a predetermined size, the key changing region being adjacent to the user data region, the data writing method includes: when the key is changed, the controller of the storage apparatus dividing the user data written in the storage medium into a plurality of pieces of the user data each corresponding to a logical block size of the logical block, encrypting a piece of the user data adjacent to the key changing region with the changed key, writing the encrypted piece into the key changing region, sequentially shifting each of the pieces of the user data other than the piece of the user data adjacent to the key changing region by one logical block size in a direction toward the key changing region from positions in the storage region in which the pieces of the divided user data other than the piece of the divided user data adjacent to the key changing region are written, and writing the shifted pieces.
-
FIG. 1 is a block diagram of a storage apparatus according to one embodiment. The storage apparatus according to the embodiment is amagnetic storage apparatus 1 such as a hard disk drive (HDD). Themagnetic storage apparatus 1 includes a micro processing unit (MPU) 11, a host interface (I/F) controller 12, a buffer memory 13, an encryption circuit controller 14, an encryption circuit 15, a read channel 16, a head integrated circuit (IC) 17, ahead 18, a servo controller 19, a voice coil motor (VCM) 20, and a spindle motor (SPM) 21. - The MPU 11 controls the entire
magnetic storage apparatus 1. The host I/F controller 12 is an interface between a host computer (host) 2 and themagnetic storage apparatus 1, and receives a request (a read request, a write request, or a key change request) from thehost 2 to inform the MPU 11 of the request. The host I/F controller 12 also returns a response for the request to thehost 2 according to an instruction of the MPU 11. Thehost 2 requests key change by sending a key change command for changing a key used to encrypt the user data, to themagnetic storage apparatus 1 via the host I/F controller 12. - The buffer memory 13 stores therein user data read out from a
storage medium 22 and user data to which a write request from thehost 2 is subjected. The encryption circuit controller 14 controls the encryption circuit 15 according to an instruction of the MPU 11 to change a key to be used by the encryption circuit 15. More specifically, once the MPU 11 receives a key change request from thehost 2, the MPU 11 instructs the encryption circuit controller 14 to change the key to be used by the encryption circuit 15 for encrypting the user data. - The encryption circuit 15 uses the key to encrypt the user data (encryption or decryption) stored in the buffer memory 13. The read channel 16 reads out the user data in the
storage medium 22 through the head IC 17 and thehead 18 according to an instruction of the MPU 11. The read channel 16 also writes user data encrypted by the encryption circuit 15 into thestorage medium 22 through the head IC 17 and thehead 18 according to an instruction of the MPU 11. The head IC 17, as is well known, reads out user data from thestorage medium 22, and writes the user data into thestorage medium 22 through thehead 18. The servo controller 19 controls and enables the VCM 20 to perform positioning control of thehead 18 according to an instruction of the MPU 11. The servo controller 19 also controls the SPM 21. The VCM 20 performs the positioning control of thehead 18 according to an instruction of the servo controller 19. The SPM 21, as is well known, rotationally drives thestorage medium 22 according to an instruction of the servo controller 19. User data is written into thestorage medium 22. -
FIG. 2 is a diagram illustrating an encryption-key-changing region. In the embodiment, as illustrated inFIG. 2 , the storage region of the storage medium includes a user data region storing the user data and an encryption-key-changing region, which is a region used for changing the key. Divided user data is written into the encryption-key-changing region when performing a key changing process. The encryption-key-changing region is provided adjacent to the user data region. Note that “Physical LBA” illustrated inFIG. 2 is a logical block address (LBA) managed by the magnetic storage apparatus, and a designated LBA is an LBA designated by the host (the same can be said forFIGS. 3 , 4, and 6). -
FIGS. 3 and 4 are diagrams for explaining an encryption key changing process of a first embodiment. It is assumed herein that the user data is encrypted with a key EK1 before changing the encryption key. Once receiving a key change command from thehost 2, the MPU 11 instructs the encryption circuit controller 14 to change the key to be used by the encryption circuit 15 for encrypting the user data, from EK1 to EK2. As illustrated inFIG. 3 , the MPU 11 divides the user data corresponding to the key to be changed into a plurality (five inFIG. 3 ) of pieces of user data each with a predetermined logical block size corresponding to the encryption-key-changing region, reads out the pieces of the user data, and sequentially stores the pieces of the user data in the buffer memory 13. The MPU 11 controls the encryption circuit 15 to encrypt a piece of the user data (data 1) adjacent to the encryption-key-changing region among the divided user data in the buffer memory 13 with the key EK2, and writes the encrypted piece into the encryption-key-changing region (see #1 inFIG. 3 ). The MPU 11 then sequentially shifts each piece of the user data (data 2 to 5) other than thedata 1 in a direction toward the encryption-key-changing region (see #2 to #5 inFIG. 3 ), and writes the shifted data. The MPU 11 sets the storage region in which the shifted piece was written as a new encryption-key-changing region, for example, every time the piece is shifted. - After the key changing process, the user data that is encrypted with the encryption key EK2 as illustrated in
FIG. 4 is written in the storage medium. When changing the encryption key EK2, the MPU 11 uses the shading portion adjacent to the user data inFIG. 4 as a new encryption-key-changing region to perform the key changing process same as the key changing process explained with reference toFIG. 3 . -
FIG. 5 is an exemplary flowchart of the encryption key changing process of the first embodiment. First, the MPU 11 determines whether all pieces of the divided user data have been shifted (S1). If the MPU 11 determines that the all pieces have been shifted, the process is terminated. If the MPU 11 determines that a piece of the divided user data remains not shifted, the MPU 11 controls the encryption circuit controller 14 to set the current encryption key (EK1) to the encryption circuit 15 (S2). The encryption circuit 15 decrypts the piece of the divided user data to be shifted with the set key EK1. The MPU 11 then stores the piece of the divided user data adjacent to the encryption-key-changing region in the buffer memory 13 (S3). The MPU 11 controls the encryption circuit controller 14 to set a new encryption key (EK2) to the encryption circuit 15 (S4). The encryption circuit 15 uses the set key EK2 to encrypt the piece of the divided user data to be shifted and being stored in the buffer memory 13. The MPU 11 then writes the encrypted piece of the divided user data into the encryption-key-changing region (S5). By S5, the divided user data is shifted into the encryption-key-changing region. After S5, the MPU 11 sets the storage region where the shifted piece of divided user data was written as a new encryption-key-changing region (S6), and the process returns to S1. - According to the first embodiment, even when the power is shut down while the data encrypted with the new key is being written into the encryption-key-changing region, the original data is stored still in the region where the shifted data was stored, thereby preventing data loss. As a result, it is possible to safely write the data encrypted with the new key into the storage medium.
-
FIG. 6 is a diagram for explaining an encryption key changing process of a second embodiment. In the second embodiment, the user data region of thestorage medium 22 is divided into a first range and a second range, corresponding to a plurality of ranges each using different key for encrypting the user data. For example, a key corresponding to the first range is EK1 a and a key corresponding to the second range is EK1 b. The encryption-key-changing region of a logical block with a predetermined size is provided so as to be adjacent to and so as to correspond to each range. In the example illustrated inFIG. 6 , a first encryption-key-changing region corresponding to the first range and a second encryption-key-changing region corresponding to the second range are provided. If a key change command received by the MPU 11 from thehost 2 relates to the first range of user data region, the MPU 11 performs the encryption key changing process in a similar manner as to that of the first embodiment explained with reference toFIGS. 3 and 4 on the user data of the first range. That is, the MPU 11 divides the user data of the first range corresponding to the key to be changed as the divided user data, encrypts a piece of the divided user data adjacent to the first encryption-key-changing region with a new key, and then writes the encrypted piece of the divided user data into the first encryption-key-changing region. Moreover, the MPU 11 sequentially shifts each piece of the divided user data in the first range other than the one that has been written into the first encryption-key-changing region in a direction toward the first encryption-key-changing region, and writes the each piece of the divided user data in the first range other than the one that has been written into the first region. If a key change command received by the MPU 11 from thehost 2 relates to the user data region of the second range, the MPU 11 performs the encryption key changing process on the user data in the second range in a similar manner to the process described above. -
FIG. 7 is a flowchart of the encryption key changing process of the second embodiment. In the second embodiment, an encryption key changing process where a key change command received by the MPU 11 from thehost 2 relates to the user data region of the first range will be explained. - First, the MPU 11 determines whether all pieces of the divided user data of the first range have been shifted (S11). If the MPU 11 determines all pieces of the divided user data of the first range have been shifted, the process is terminated. If the MPU 11 determines a piece of the divided user data of the first range remains not shifted, the MPU 11 controls the encryption circuit controller 14 to set the current encryption key (EK1 a) to the encryption circuit 15 (S12). The MPU 11 then stores the piece of the divided user data of the first range adjacent to the first encryption-key-changing region in the buffer memory 13 (S13). The MPU 11 controls the encryption circuit controller 14 to set a new encryption key (EK2 a) to the encryption circuit 15 (S14). By S14, the piece of the divided user data stored in the buffer memory 13 is encrypted with the key EK2 a. The MPU 11 writes the encrypted piece of the divided user data into the first encryption-key-changing region (S15). By S15, the divided user data is shifted into the encryption-key-changing region. After S15, the MPU 11 sets the storage region in which the shifted divided user data was written as a new first encryption-key-changing region (S16), and the process returns to S11.
- According to the second embodiment, it is possible to sequentially write pieces of the divided user data to be shifted into a region for changing a key corresponding to the range of the divided user data.
-
FIG. 8 is an explanatory diagram of an encryption key changing process of a third embodiment. In the third embodiment, similarly to the second embodiment, the user data region of thestorage medium 22 is divided into the first range with the corresponding key EK1 a and the second range with the corresponding key EK1 b. Moreover, an encryption-key-changing region with a logical block of a predetermined size is provided adjacent to any one of the ranges. In the third embodiment, not only the user data with a corresponding key is changed but also the user data with an unchanged key is to be shifted in a direction toward the encryption-key-changing region. - As illustrated in
FIG. 8 , it is assumed herein that the encryption-key-changing region is provided adjacent to the second range. When a key change command received by the MPU 11 from thehost 2 relates to the user data region of the first range, the MPU 11 divides the user data of the second range into a plurality of pieces of second divided user data and the user data of the first range into a plurality of pieces of first divided user data. The MPU 11 sequentially stores the pieces of the second divided user data in the buffer memory 13 without decryption. Alternatively, the MPU 11 may sequentially store the pieces of the second divided user data in the buffer memory 13 after decryption with any key (for example, with the key EK1 b used to encrypt the second divided user data). Then, the MPU 11 decrypts the pieces of the first divided user data with the key EK1 a used to encrypt thereof, and sequentially stores the pieces of the first divided user data in the buffer memory 13. - Subsequently, the MPU 11 sequentially shifts each piece of the second divided user data in a direction toward the encryption-key-changing region (see #1 in
FIG. 8 ), and writes the each shifted piece. The MPU 11 sets the storage region in which the shifted second divided user data was written as a new encryption-key-changing region, for example, every time the second divided user data is shifted (the same applies to the shifting of the first divided user data described later). That is, in the third embodiment, the pieces of the divided user data adjacent to the sequentially set encryption-key-changing region are to be shifted. Once all pieces of the second divided user data have been shifted, the MPU 11 encrypts the first divided user data stored in the buffer memory 13 with the new key EK2 a. The MPU 11 then sequentially shifts the encrypted pieces of the first divided user data in a direction toward the encryption-key-changing region (see #2 inFIG. 8 ), and writes the shifted pieces. -
FIG. 9 is a flowchart of the encryption key changing process of the third embodiment. The MPU 11 determines whether all pieces of the divided user data have been shifted (S21). If the MPU 11 determines all pieces of the divided user data have been shifted, the process is terminated. If the MPU 11 determines a piece of the divided user data remains not shifted, the MPU 11 determines whether the piece of the divided user data to be shifted is the divided user data in the range corresponding to the key to be changed (key changed data) (S22). If the MPU 11 determines the piece of the divided user data to be shifted is not the key changed data, the MPU 11 controls the encryption circuit controller 14 to perform a encryption invalid setting on the encryption circuit 15 (S23). The encryption invalid setting is a setting not to perform the encryption processing on the divided user data. - Then, the MPU 11 stores the piece of the divided user data adjacent to the encryption-key-changing region in the buffer memory 13 (S24). The MPU 11 controls the encryption circuit controller 14 to perform the encryption invalid setting on the encryption circuit 15 (S25). The MPU 11 then writes the divided user data stored in the buffer memory 13 into the encryption-key-changing region (S26). By S26, the divided user data is shifted into the encryption-key-changing region. After S26, the MPU 11 sets the storage region in which the shifted divided user data was written as a new encryption-key-changing region (S27), and the process returns to S21.
- At S22, if the MPU 11 determines the piece of the divided user data to be shifted is the key changed data, the MPU 11 controls the encryption circuit controller 14 to set the current key (the key originally used for the encryption processing of the key changed data) to the encryption circuit 15 (S28). The encryption circuit 15 uses the set current key to decrypt the piece of the divided user data to be shifted and being stored in the buffer memory 13. The MPU 11 then stores the piece of the divided user data to be shifted, that is, a piece of the divided user data adjacent to the encryption-key-changing region, in the buffer memory 13 (S29). The MPU 11 controls the encryption circuit controller 14 to set a new key to the encryption circuit 15 (S30). The encryption circuit 15 uses the set new key to encrypt the piece of the divided user data to be shifted and stored in the buffer memory 13.
- Subsequently, the MPU 11 writes the divided user data that is encrypted with the new key into the encryption-key-changing region (S31). By S31, the divided user data is shifted into the encryption-key-changing region. After S31, the MPU 11 sets the storage region in which the shifted divided user data was written as a new encryption-key-changing region (S32), and the process returns to S21.
- Instead of S23, the MPU 11 may set any key to decrypt a piece of the divided user data to be shifted with the set key. Moreover, instead of S25, the MPU 11 may set any key as mentioned above to encrypt a piece of the divided user data to be shifted with the set key.
- According to the third embodiment, it is possible to encrypt the divided user data in a range corresponding to a new key with the new key, sequentially shift pieces of the divided user data in a direction toward the encryption-key-changing region, and write the shifted pieces. Further, according to the third embodiment, it is possible to sequentially shift pieces of the divided user data in a range other than the range corresponding to the new key in a direction toward the encryption-key-changing region, and write the shifted pieces, without the encryption processing.
- In the storage apparatus and the data writing method, when a key is changed, the user data written in the storage medium is divided into a plurality of pieces of user data. A piece of the divided user data adjacent to the key-changing region, which is provided on the storage medium, is encrypted with the new key and written into the key-changing region. In addition, pieces of the divided user data other than the one adjacent to the key-changing region are sequentially shifted in a direction from positions in the storage region where the pieces of the divided user data are written toward the key-changing region, and written. Consequently, with the storage apparatus and the data writing method of one of the embodiments, even if power is turned off while the data encrypted with the new key is being written into the key-changing region, the original data remains in the region before it is shifted, thereby preventing data loss. As a result, it is possible to safely write the data encrypted with the new key into the storage medium.
- Furthermore, in the storage apparatus and the data writing method, unlike conventional storage apparatuses, user data encrypted with a new key is not written in the same sector after it is retreated to a temporal retreat region. Consequently, it is possible to rapidly write the user data encrypted with the new key into the storage medium.
- The various modules of the systems described herein can be implemented as software applications, hardware and/or software modules, or components on one or more computers, such as servers. While the various modules are illustrated separately, they may share some or all of the same underlying logic or code.
- While certain embodiments of the inventions have been described, these embodiments have been presented by way of example only, and are not intended to limit the scope of the inventions. Indeed, the novel methods and systems described herein may be embodied in a variety of other forms; furthermore, various omissions, substitutions and changes in the form of the methods and systems described herein may be made without departing from the spirit of the inventions. The accompanying claims and their equivalents are intended to cover such forms or modifications as would fall within the scope and spirit of the inventions.
Claims (8)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2008-303316 | 2008-11-28 | ||
JP2008303316A JP2010129128A (en) | 2008-11-28 | 2008-11-28 | Storage apparatus, and data writing method |
Publications (1)
Publication Number | Publication Date |
---|---|
US20100138670A1 true US20100138670A1 (en) | 2010-06-03 |
Family
ID=42223864
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/568,330 Abandoned US20100138670A1 (en) | 2008-11-28 | 2009-09-28 | Storage apparatus and data writing method |
Country Status (2)
Country | Link |
---|---|
US (1) | US20100138670A1 (en) |
JP (1) | JP2010129128A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012047199A1 (en) * | 2010-10-05 | 2012-04-12 | Hewlett-Packard Development Company, L.P. | Modifying a length of an element to form an encryption key |
US20120278635A1 (en) * | 2011-04-29 | 2012-11-01 | Seagate Technology Llc | Cascaded Data Encryption Dependent on Attributes of Physical Memory |
US20160119135A1 (en) * | 2012-06-05 | 2016-04-28 | Secure Channels Sa | System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths |
US9397834B2 (en) | 2010-10-05 | 2016-07-19 | Hewlett-Packard Development Company, L.P. | Scrambling an address and encrypting write data for storing in a storage device |
US20210133335A1 (en) * | 2018-08-24 | 2021-05-06 | Micron Technology, Inc. | Modification of a segment of data based on an encryption operation |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4791741B2 (en) * | 2005-03-16 | 2011-10-12 | 株式会社リコー | Data processing apparatus and data processing method |
US8037320B2 (en) * | 2007-03-31 | 2011-10-11 | Lenovo (Singapore) Pte. Ltd | Magnetic recording medium encryption |
JP2008192291A (en) * | 2008-02-20 | 2008-08-21 | Hitachi Ltd | Digital signal recording device, reproducing device, and recording medium |
-
2008
- 2008-11-28 JP JP2008303316A patent/JP2010129128A/en active Pending
-
2009
- 2009-09-28 US US12/568,330 patent/US20100138670A1/en not_active Abandoned
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012047199A1 (en) * | 2010-10-05 | 2012-04-12 | Hewlett-Packard Development Company, L.P. | Modifying a length of an element to form an encryption key |
GB2498122A (en) * | 2010-10-05 | 2013-07-03 | Hewlett Packard Development Co | Modifying a length of an element to form an encryption key |
US9397834B2 (en) | 2010-10-05 | 2016-07-19 | Hewlett-Packard Development Company, L.P. | Scrambling an address and encrypting write data for storing in a storage device |
US20120278635A1 (en) * | 2011-04-29 | 2012-11-01 | Seagate Technology Llc | Cascaded Data Encryption Dependent on Attributes of Physical Memory |
US8862902B2 (en) * | 2011-04-29 | 2014-10-14 | Seagate Technology Llc | Cascaded data encryption dependent on attributes of physical memory |
US20160119135A1 (en) * | 2012-06-05 | 2016-04-28 | Secure Channels Sa | System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths |
US20210133335A1 (en) * | 2018-08-24 | 2021-05-06 | Micron Technology, Inc. | Modification of a segment of data based on an encryption operation |
US11720690B2 (en) * | 2018-08-24 | 2023-08-08 | Micron Technology, Inc. | Modification of a segment of data based on an encryption operation |
Also Published As
Publication number | Publication date |
---|---|
JP2010129128A (en) | 2010-06-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8239691B2 (en) | Data storage device and management method of cryptographic key thereof | |
US8037320B2 (en) | Magnetic recording medium encryption | |
KR101534370B1 (en) | Data whitening for writing and reading data to and from a non-volatile memory | |
US20120020474A1 (en) | Recording device, controller, control method of recording device | |
JP5004190B2 (en) | Protect stored data from traffic analysis | |
US20120137139A1 (en) | Data storage device, data control device and method for encrypting data | |
CN104424016B (en) | Virtual tape concentration for self-encrypting drives | |
WO2008063965A2 (en) | Method and system to provide security implementation for storage devices | |
US9323943B2 (en) | Decrypt and encrypt data of storage device | |
JP2008085986A (en) | Data conversion unit, electronic apparatus, and data conversion method | |
US20090175453A1 (en) | Storage apparatus and encrypted data processing method | |
US9270445B2 (en) | Solid state disk and input/output method | |
US20100138670A1 (en) | Storage apparatus and data writing method | |
US20090022320A1 (en) | Content copying device and content copying method | |
JP3978200B2 (en) | Data protection method and data protection apparatus in data storage / retrieval system | |
US20100241870A1 (en) | Control device, storage device, data leakage preventing method | |
JP2004199688A (en) | Secure driver | |
JP5005477B2 (en) | Nonvolatile memory device | |
JP2009187646A (en) | Encrypting/decrypting apparatus for hard disk drive, and hard disk drive apparatus | |
US20100191981A1 (en) | Storage apparatus and data falsification preventing method thereof | |
JP4738546B2 (en) | Data leakage prevention system and data leakage prevention method | |
JP2005172866A (en) | Encryption/decryption system | |
JP2012104170A (en) | Hard disk device | |
JP4738547B2 (en) | Storage device and data leakage prevention method | |
JP2010011247A (en) | Disk drive and key exchange method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FUJITSU LIMITED,JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SHINBORI, TAKAHIRO;KUDO, YOSHIYUKI;TANAKA, HIDEAKI;SIGNING DATES FROM 20090909 TO 20090910;REEL/FRAME:023291/0812 |
|
AS | Assignment |
Owner name: TOSHIBA STORAGE DEVICE CORPORATION,JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FUJITSU LIMITED;REEL/FRAME:023558/0225 Effective date: 20091014 Owner name: TOSHIBA STORAGE DEVICE CORPORATION, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FUJITSU LIMITED;REEL/FRAME:023558/0225 Effective date: 20091014 |
|
STCB | Information on status: application discontinuation |
Free format text: EXPRESSLY ABANDONED -- DURING EXAMINATION |